Risk-Aware Secure Data Mesh using Databricks for SAP and Healthcare Cloud Platforms

Authors

  • Hassan Ahmed Rashid Al-Mazrouei Senior Full-Stack Developer, Sharjah, UAE Author

DOI:

https://doi.org/10.15662/IJARCST.2025.0805025

Keywords:

Data Mesh, Databricks Lakehouse, SAP Cloud, Healthcare Analytics, Risk-Aware Security, Data Governance, Cloud Architecture

Abstract

The rapid adoption of cloud platforms in SAP-enabled healthcare environments has intensified challenges related to data security, regulatory compliance, scalability, and risk management. Traditional centralized data architectures often struggle to support real-time analytics, cross-domain interoperability, and governance at scale. This paper proposes a Risk-Aware Secure Data Mesh using Databricks for SAP and healthcare cloud platforms, enabling decentralized data ownership while enforcing enterprise-wide security and governance policies. The framework integrates Databricks Lakehouse capabilities with domain-oriented data products, zero-trust security principles, and automated risk controls across networks, APIs, and data layers. Advanced access control, encryption, lineage tracking, and policy-as-code mechanisms are employed to ensure compliance with healthcare regulations and SAP data standards. The proposed architecture supports real-time and batch analytics, improves data reliability, and enhances operational resilience in multi-cloud and hybrid environments. By embedding risk-awareness into data pipelines and analytics workflows, the solution enables secure data sharing, faster insights, and informed decision-making across healthcare business processes.

References

1. Abadi, D. J., et al. (2009). MapReduce-like systems and big data processing. Proceedings of the VLDB Endowment, 2(2), 123–134.

2. Codd, E. F. (1970). A relational model of data for large shared data banks. Communications of the ACM, 13(6), 377–387.

3. Dehghani, Z. (2020). Data mesh: Delivering data-driven value at scale. O’Reilly Media.

4. Gopinathan, V. R. (2024). AI-Driven Customer Support Automation: A Hybrid Human–Machine Collaboration Model for Real-Time Service Delivery. International Journal of Technology, Management and Humanities, 10(01), 67-83.

5. Navandar, P. (2025). AI Based Cybersecurity for Internet of Things Networks via Self-Attention Deep Learning and Metaheuristic Algorithms. International Journal of Research and Applied Innovations, 8(3), 13053-13077.

6. Sakhawat Hussain, T., Rahanuma, T., & Md Manarat Uddin, M. (2023). Privacy-Preserving Behavior Analytics for Workforce Retention Approach. American Journal of Engineering, Mechanics and Architecture, 1(9), 188-215.

7. Archana, R., & Anand, L. (2025). Residual u-net with Self-Attention based deep convolutional adaptive capsule network for liver cancer segmentation and classification. Biomedical Signal Processing and Control, 105, 107665.

8. Muthusamy, M. (2025). A Scalable Cloud-Enabled SAP-Centric AI/ML Framework for Healthcare Powered by NLP Processing and BERT-Driven Insights. International Journal of Computer Technology and Electronics Communication, 8(5), 11457-11462.

9. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

10. Chivukula, V. (2020). IMPACT OF MATCH RATES ON COST BASIS METRICS IN PRIVACY- PRESERVING DIGITAL ADVERTISING. International Journal of Advanced Research in Computer Science & Technology, 3(4), 3400–3405.

11. Mahajan, N. (2024). AI-Enabled Risk Detection and Compliance Governance in Fintech Portfolio Operations. Cuestiones de Fisioterapia, 53(03), 5366-5381.

12. Gartner. (2019). Market guide for data governance tools. Gartner Research.

13. Karnam, A. (2024). Next-Gen Observability for SAP: How Azure Monitor Enables Predictive and Autonomous Operations. International Journal of Computer Technology and Electronics Communication, 7(2), 8515–8524. https://doi.org/10.15680/IJCTECE.2024.0702006

14. Kusumba, S. (2025). Integrated Order And Invoice Tracking: Optimizing Supply Chain Visibility And Financial Operations. Journal of International Crisis & Risk Communication Research (JICRCR), 8.

15. Paul, D., Soundarapandiyan, R., & Sivathapandi, P. (2021). Optimization of CI/CD Pipelines in Cloud-Native Enterprise Environments: A Comparative Analysis of Deployment Strategies. Journal of Science & Technology, 2(1), 228-275.

16. Kabade, S., Sharma, A., & Kagalkar, A. (2024). Securing Pension Systems with AI-Driven Risk Analytics and Cloud-Native Machine Learning Architectures. International Journal of Emerging Research in Engineering and Technology, 5(2), 52-64.

17. Meka, S. (2025). Redefining Data Access: A Decentralized SDK for Unified and Secure Data Retrieval. Journal Code, 1325, 7624.

18. Thambireddy, S. (2021). Enhancing Warehouse Productivity through SAP Integration with Multi-Model RF Guns. International Journal of Computer Technology and Electronics Communication, 4(6), 4297-4303.

19. Bussu, V. R. R. (2024). End-to-End Architecture and Implementation of a Unified Lakehouse Platform for Multi-ERP Data Integration using Azure Data Lake and the Databricks Lakehouse Governance Framework. International Journal of Computer Technology and Electronics Communication, 7(4), 9128-9136.

20. Kasireddy, J.R. (2025). Quantifying the Causal Effect of FMCSA Enforcement Interventions on Truck Crash Reduction: A Quasi-Experimental Approach Using Carrier-Level Safety Data. International journal of humanities and information technology, 7(2), 25-32

21. Nagarajan, G. (2024). A Cybersecurity-First Deep Learning Architecture for Healthcare Cost Optimization and Real-Time Predictive Analytics in SAP-Based Digital Banking Systems. International Journal of Humanities and Information Technology, 6(01), 36-43.

22. Kumar, S. S. (2024). SAP-Based Digital Banking Architecture Using Azure AI and Deep Learning for Real-Time Healthcare Predictive Analytics. International Journal of Technology, Management and Humanities, 10(02), 77-88.

23. Sivaraju, P. S. (2022). Enterprise-Scale Data Center Migration and Consolidation: Private Bank's Strategic Transition to HP Infrastructure. International Journal of Computer Technology and Electronics Communication, 5(6), 6123-6134.

24. TOHFA, N. A., Alim, M. A., Arif, M. H., Rahman, M. R., Rahman, M., Rasul, I., & Hossen, M. S. (2025). Machine learning–enabled anomaly detection for environmental risk management in banking. https://www.researchgate.net/profile/Md-Reduanur-Rahman/publication/399121397_Machine_learning-enabled_anomaly_detection_for_environmental_risk_management_in_banking/links/6950ad360c98040d4823698d/Machine-learning-enabled-anomaly-detection-for-environmental-risk-management-in-banking.pdf

25. Singh, A. Evaluating Reliability in Mission-Critical Communication: Methods and Metrics. https://www.researchgate.net/profile/Abhishek-Singh-679/publication/393844208_Evaluating_Reliability_in_Mission-Critical_Communication_Methods_and_Metrics/links/687d001a1a77b36b5b0439e6/Evaluating-Reliability-in-Mission-Critical-Communication-Methods-and-Metrics.pdf

26. Inmon, W. H. (1992). Building the data warehouse. John Wiley & Sons.

27. Natta P K. AI-Driven Decision Intelligence: Optimizing Enterprise Strategy with AI-Augmented Insights[J]. Journal of Computer Science and Technology Studies, 2025, 7(2): 146-152.

28. Gopinathan, V. R. (2024). Meta-Learning–Driven Intrusion Detection for Zero-Day Attack Adaptation in Cloud-Native Networks. International Journal of Humanities and Information Technology, 6(01), 19-35.

29. Poornima, G., & Anand, L. (2024, April). Effective Machine Learning Methods for the Detection of Pulmonary Carcinoma. In 2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) (pp. 1-7). IEEE.

30. Russell, S., & Norvig, P. (1995). Artificial intelligence: A modern approach. Prentice Hall.

31. Adari, V. K. (2024). How Cloud Computing is Facilitating Interoperability in Banking and Finance. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11465-11471.

32. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.

33. Sugumar, R. (2024). Next-Generation Security Operations Center (SOC) Resilience: Autonomous Detection and Adaptive Incident Response Using Cognitive AI Agents. International Journal of Technology, Management and Humanities, 10(02), 62-76.

34. Madabathula, L. (2025). Dynamic Data Orchestration: Enhancing Business Intelligence with Azure Data Factory. IJSAT-International Journal on Science and Technology, 16(1).

35. Madathala, H., Thumala, S. R., Barmavat, B., & Prakash, K. K. S. (2024). Functional consideration in cloud migration. International Peer Reviewed/Refereed Multidisciplinary Journal (EIPRMJ), 13(2).

36. Zhu, H., & Yang, J. (2021). Secure cloud architectures for healthcare data. Journal of Cloud Computing, 10(1), 1–12.

Downloads

Published

2026-09-15

How to Cite

Risk-Aware Secure Data Mesh using Databricks for SAP and Healthcare Cloud Platforms. (2026). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 8(5), 12941-12948. https://doi.org/10.15662/IJARCST.2025.0805025